Sciweavers

11603 search results - page 77 / 2321
» Securing Embedded Systems
Sort
View
131
Voted
CCS
2009
ACM
15 years 9 months ago
A new cell counter based attack against tor
Various low-latency anonymous communication systems such as Tor and Anoymizer have been designed to provide anonymity service for users. In order to hide the communication of user...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
101
Voted
COMPSAC
2008
IEEE
15 years 8 months ago
Embedded Systems Resources: Views on Modeling and Analysis
The conflicting requirements of real-time embedded systems, e.g. minimizing memory usage while still ensuring that all deadlines are met at run-time, require rigorous analysis of...
Aneta Vulgarakis, Cristina Cerschi Seceleanu
89
Voted
DATE
2004
IEEE
136views Hardware» more  DATE 2004»
15 years 6 months ago
Data Windows: A Data-Centric Approach for Query Execution in Memory-Resident Databases
Structured embedded databases are currently becoming an integrated part of embedded systems, thus, enabling higher standards in system automation. These embedded databases are typ...
Jayaprakash Pisharath, Alok N. Choudhary, Mahmut T...
103
Voted
CSREASAM
2006
15 years 3 months ago
Design and Implementation of a High-Performance Active Network Security System
This paper describes the design, implementation and performance of a high-performance security system - Active Network Security Immune System (ANSIS)
Wen Ouyang, Kun-Ming Yu, Wen-Ping Lee
136
Voted
TPDS
2008
202views more  TPDS 2008»
15 years 2 months ago
Control-Based Adaptive Middleware for Real-Time Image Transmission over Bandwidth-Constrained Networks
Real-time image transmission is crucial to an emerging class of distributed embedded systems operating in open network environments. Examples include avionics mission replanning ov...
Xiaorui Wang, Ming Chen, Huang-Ming Huang, Venkita...